You are on page 1of 19

ASSIGNMENT 2 FRONT SHEET

Qualification BTEC Level 5 HND Diploma in Computing

Unit number and title Unit 16: Cloud Computing

Submission date Date Received 1st submission

Re-submission Date Date Received 2nd submission

Student Name Phan Nguyen Thanh Tung Student ID GCS17645

Class 0701B Assessor name

Student declaration

I certify that the assignment submission is entirely my own work and I fully understand the consequences of plagiarism. I understand that
making a false declaration is a form of malpractice.

Student’s signature

Grading grid

P5 P6 P7 P8 M3 M4 D2 D3

1|Page
 Summative Feedback:  Resubmission Feedback:

Grade: Assessor Signature: Date:


Signature & Date:

2|Page
Contents
P5: Configure a Cloud Computing platform with a cloud service provider’s framework .............................................................................................. 4
P6: Implement a cloud platform using open source tools. ............................................................................................................................................ 4
P7: Analyse the most commonproblems which arise in a Cloud Computing platform and discuss appropriate solutions to these problems. ........ 15
P8: Assess the most common security issues in cloud environments. ........................................................................................................................ 17
References ................................................................................................................................................................................................................... 19

3|Page
P5: Configure a Cloud Computing platform with a cloud service provider’s framework

P6: Implement a cloud platform using open source tools.


There are source codes of My website

4|Page
5|Page
6|Page
7|Page
And Example pictures of my Website

8|Page
Home Page

Contact Page

9|Page
Blog Page

10 | P a g e
About Page

11 | P a g e
Next I connect my website to Github

12 | P a g e
My website after uploading Heroku

13 | P a g e
Finally, deploy to Heroku successfully

14 | P a g e
P7: Analyse the most commonproblems which arise in a Cloud Computing platform and discuss
appropriate solutions to these problems.
There are several issues associated with private clouds as discussed in the following:

15 | P a g e
1. SLA: SLA plays a very important role in any cloud service deployment model. For any cloud to operate, there must be certain
agreements between the user and the service provider. The service provider will agree upon certain terms and conditions regarding
the service delivery. These terms and conditions need to be strictly followed, if not there will be a penalty on the part of the
defaulting party. If the service provider fails to provide services as per the SLA, then he has to pay a penalty to the user, this penalty
can be in any form, which is termed according to the SLA. These SLAs have different effects on different cloud delivery models. Here
in the private cloud, the SLAs are defined between an organization and its users, that is, mostly employees. Usually, these users have
broader access rights than the general public cloud users. Similarly in the service provider’s side, the service providers are able to
efficiently provide the service because of the small user base and mostly efficient network.

2. Network: The cloud is totally dependent on the network that is laid out. The network usually consists of a high bandwidth and has
a low latency. This is because the connection is only inside the organization. Network management is easier in this case, and
resolving a network issue is easier.

3. Performance: The performance of a cloud delivery model primarily depends on the network and resources. Since here the
networks are managed internally, the performance can be controlled by the network management team, and mostly this would
have good performance as the number of resources is low.

4. Security and data privacy: Security and data privacy, though a problem with every type of service model, affect the private cloud
the least. As the data of the users are solely managed by the company and most of the data would be related to the organization or
company, here there is a lesser chance that the data will be leaked to people outside as there are no users outside the organization.
Hence, comparatively, the private cloud is more resistant to attacks than any other cloud type purely because of the type of users
and local area network. But, security breaches are possible if an internal user misuses the privileges.

5. Location: The private cloud does not have any problems related to the location of data being stored. In a private cloud, the data
are internal and are usually stored in the same geographical location where the cloud users, that is, organization, are present.

6. Cloud management: Cloud management is a broad area where the entire cloud related tasks are managed in order to provide
seamless services to the customers. This involves several tasks such as resource scheduling, resource provisioning, and resource
management. The number of users, the network size, and the amount of resources are some of the important parameters that
affect the management of the cloud. Here, the network is small, and the numbers of users and the amount of resources are less.
16 | P a g e
7. Multitenancy: The cloud basically has a multitenant architecture. As multitenant architecture supports multiple tenants with the
same physical or software resource, there is a chance of unwanted access of data, and it will have less effect in the private cloud as
all the issues will be intraorganizational.

8. Maintenance: The cloud is maintained by the organization where the cloud is deployed. The defective resources example: drives
and processors are replaced with the good resources. The number of resources is less in the private cloud, so maintenance is
comparatively easier.

P8: Assess the most common security issues in cloud environments.


Affordable, efficient, and scalable, cloud computing is still the best solution for most businesses but it can still leave you vulnerable if
the proper precautions aren't taken. Here are six of the most common cloud computing security risks:

1. Distributed Denial of Service Attacks

When cloud computing first became popular, Distributed Denial of Service attacks against cloud platforms were largely unthinkable;
the sheer amount of resources cloud computing services had made DDoS attacks extremely difficult to initiate. But with as many
Internet of Things devices, smartphones, and other computing systems as there are available now, DDoS attacks have greatly
increased in viability. If enough traffic is initiated to a cloud computing system, it can either go down entirely or experience
difficulties.

2. Shared Cloud Computing Services

Not all cloud hosting solutions and cloud computing services are made equal. Many cloud solutions do not provide the necessary
security between clients, leading to shared resources, applications, and systems. In this situation, threats can originate from other
clients with the cloud computing service, and threats targeting one client could also have an impact on other clients.

3. Employee Negligence

17 | P a g e
Employee negligence and employee mistakes remain one of the biggest security issues for all systems, but the threat is particularly
dangerous with cloud solutions. Modern employees may log into cloud solutions from their mobile phones, home tablets, and home
desktop PCs, potentially leaving the system vulnerable to many outside threats.

4. Data Loss and Inadequate Data Backups

Inadequate data backups and improper data syncing is what has made many businesses vulnerable to ransomware, a specific type of
cloud security threat. Ransomware "locks" away a company's data in encrypted files, only allowing them to access the data once a
ransom has been paid. With appropriate data backup solutions, companies need no longer fall prey to these threats.

5. Phishing and Social Engineering Attacks

Due to the openness of a cloud computing system, phishing and social engineering attacks have become particularly common. Once
login information or other confidential information is acquired, a malicious user can potentially break into a system with ease as the
system itself is available from anywhere. Employees must be knowledgeable about phishing and social engineering enough to avoid
these types of attacks.

6. System Vulnerabilities

Cloud computing systems can still contain system vulnerabilities, especially in networks that have complex infrastructures and
multiple third party platforms. Once a vulnerability becomes known with a popular third party system, this vulnerability can be easily
used against organizations. Proper patching and upgrade protocols in addition to network monitoring solutions are critical for
fighting this threat.

Cloud computing security issues are not insurmountable; in fact, many of the risks above can be protected against through the use
of a dedicated data protection service. Cloud data protection solutions will both protect data from loss and against cyber security
threats, allowing businesses to leverage the power of the cloud without the associated risk.

18 | P a g e
References
https://www.cwps.com/blog/cloud-computing-security-issues

Essential of Cloud Computing Book

19 | P a g e

You might also like